Books+ Search Results

Microsoft Windows security : essentials

Title
Microsoft Windows security : essentials / Darril Gibson.
ISBN
9781118114575
1118114574
9781118114568
1118114566
9781118114544
111811454X
9781118016848
111801684X
Published
Indianapolis, Ind. : Wiley, ©2011.
Physical Description
1 online resource (xxiv, 347 pages) : color illustrations
Local Notes
Access is available to the Yale community.
Access and use
Access restricted by licensing agreement.
Summary
Annotation Windows security concepts and technologies for IT beginnersIT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content. Serves as an ideal resource for gaining a solid understanding of fundamental security concepts and skillsOffers a straightforward and direct approach to security basics and covers anti-malware software products, firewalls, network topologies and devices, network ports, and moreReviews all the topics you need to know for taking the MTA 98-367 examProvides an overview of security components, looks at securing access with permissions, addresses audit policies and network auditing, and examines protecting clients and serversIf you're new to IT and interested in entering the IT workforce, then Microsoft Windows Security Essentials is essential reading.
Variant and related titles
O'Reilly Safari. OCLC KB.
Other formats
Print version: Gibson, Darril. Microsoft Windows security. Indianapolis, Ind. : Wiley, ©2011
Format
Books / Online
Language
English
Added to Catalog
January 10, 2020
Series
Serious skills.
Sybex serious skills
Contents
Microsoft Windows Security Essentials
Introduction
Who Should Read This Book
What You Will Learn
Prerequisites
What You Need
What Is Covered in This Book
Chapter 1: Understanding Core Security Principles
Understanding Risk
Exploring the Security Triad
Protecting Against Loss of Confidentiality
Protecting Against Loss of Availability
Protecting Against Loss of Integrity
Implementing a Defense-in-Depth SecurityÂStrategy
Enforcing the Principle of Least Privilege
Hardening a Server
Reducing the Attack Surface
Keeping a System Updated
Enabling the Firewall
Installing Antivirus Software
Chapter 2: Understanding Malware and SocialÂEngineering
Comparing Malware
Viruses
Worms
Trojan Horses
Buffer-Overflow Attacks
Spyware
Understanding the Threat
Protecting Against Malware
Using Antivirus Software
Using Microsoft Security Essentials on Desktops
Thwarting Social-Engineering Attacks
Social Engineering in Person
Social Engineering with a Phone Call
Recognizing Phishing Attempts
Recognizing Pharming
Protecting Email
Chapter 3: Understanding User Authentication
Comparing the Three Factors ofÂAuthentication
Using Passwords for Authentication
Comparing Password Attack Methods
Creating Strong Passwords
Enforcing Strong Passwords
Exploring Account Lockout Policies
Unlocking an Account
Resetting a Password
Changing a Password
Creating a Password-Reset Disk
Using Smart Cards and Token Devices forÂAuthentication
Using Biometrics for Authentication
Starting Applications with RunÂAsÂAdministrator
Preventing Time Skew with Kerberos
Identifying RADIUS Capabilities
Identifying Unsecure AuthenticationÂProtocols
LM
NTLM (NTLMv1)
Chapter 4: Securing Access withÂPermissions
Comparing NTFS Permissions.
Identifying Basic NTFS Permissions
Identifying Advanced NTFS Permissions
Combining Permissions
Enabling and Disabling Permission Inheritance
Moving and Copying Files
Comparing NTFS and FAT
Exploring Share Permissions
Identifying Share Permissions
Combining NTFS and Share Permissions
Identifying Active Directory Permissions
Viewing Active Directory Users and Computers
Comparing NTFS and ActiveÂDirectoryÂPermissions
Viewing Active Directory Permissions
Assigning Registry Permissions
Chapter 5: Using Audit Policies and Network Auditing
Exploring Audit Policies
Exploring Object Access Auditing
Comparing Account Logon and Logon Events
Exploring Directory Service Access Auditing
Understanding Account Management Auditing
Understanding System Events Auditing
Understanding Privilege Use Auditing
Understanding Policy Change Auditing
Understanding Process Tracking
Enabling Auditing
Enabling Object Access Auditing
Enabling Directory Service Access Auditing
Viewing Audit Information
Managing Security Logs
Saving Audit Information
Securing Audit Information
Auditing a Network with MBSA
Installing MBSA
Running MBSA
Chapter 6: Protecting Clients and Servers
Understanding User Account Control
Understanding the Dimmed Desktop
Modifying User Account Control
Keeping Systems Updated
Updating Systems with Automatic Updates
Updating Systems with WSUS or SCCM
Using Group Policy to Configure Clients
Protecting Clients
Understanding Offline Folders
Encrypting Offline Folders
Using Software-Restriction Policies
Protecting Servers
Using Separate VLANs
Separating Services
Using Read-Only Domain Controllers
Exploring DNS Security Issues
Protecting Against Email Spoofing withÂSPFÂRecords
Understanding Dynamic Updates.
Using Secure Dynamic Updates
Chapter 7: Protecting a Network
Identifying Common Attack Methods
Denial of Service
Distributed Denial of Service
Sniffing Attack
Spoofing Attack
Port Scan
Exploring Firewalls
Comparing Hardware-Based and Software-BasedÂFirewalls
Comparing UTMs and SCMs
Isolating Servers on Perimeter Networks
Using Honeypots
Isolating a Network with NAT
Exploring Network Access Protection
Understanding NAP Components
Evaluating Client Health with VPN Enforcement
Using Other NAP Enforcement Methods
Identifying NAP Requirements
Identifying Protocol Security Methods
IPsec
Comparing Tunneling Protocols
DNSSEC
Chapter 8: Understanding Wireless Security
Comparing Wireless Devices
Wireless Adapters
Wireless Access Points
Wireless Routers
Comparing Wireless Security Methods
Understanding Encryption Keys
Wired Equivalent Privacy
Wi-Fi Protected Access
Wi-Fi Protected Access Version 2
Extended Authentication Protocol
Viewing Windows 7 Wireless Settings
Configuring Wireless Routers
Changing the Default Administrator Password
Changing the SSID
To Broadcast or Not to Broadcast
Using MAC Filters
Configuring Windows 7 for Wireless
Chapter 9: Understanding Physical Security
Comparing Site Security and ComputerÂSecurity
Understanding the Importance of Physical Security
Controlling Physical Access
Using Switches Instead of Hubs
Using Group Policy to Enhance ComputerÂSecurity
Understanding Default GPOs
Designing OUs and GPOs to Manage UsersÂandÂComputers
Creating OUs in a Domain
Moving Objects into an OU
Creating GPOs to Manage Users and Computers
Understanding Security Settings in a GPO
Disabling Log On Locally with Group Policy
Controlling Removable Storage Access withÂGroup Policy.
Genre/Form
Study guides.
Also listed under
Safari Books Online (Firm)
Citation

Available from:

Online
Loading holdings.
Unable to load. Retry?
Loading holdings...
Unable to load. Retry?